Tenda AC6 fromDhcpListClient stack-based overflow
CVE-2023-2923
9.8CRITICAL
Summary
A stack-based buffer overflow vulnerability has been identified in the Tenda AC6 Router, specifically in the function fromDhcpListClient. This vulnerability can be exploited remotely, potentially allowing an attacker to manipulate the router's functionality by providing crafted input. The exploit has been publicly disclosed, raising concerns for users of the affected firmware version (US_AC6V1.0BR_V15.03.05.19). Initial outreach to the vendor regarding this vulnerability went unanswered, which emphasizes the urgency for users to take necessary precautions.
Affected Version(s)
AC6 US_AC6V1.0BR_V15.03.05.19
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database
Credit
tianwenqi (VulDB User)